Tampa, FL, November 18, 2022 – Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, was awarded the Best Identity Access Management Solution award in the American Security Today’s annual ASTOR awards program

 In its seventh year, the ASTORS awards program recognizes government and vendor solutions that deliver enhanced value, benefit and intelligence to end users in a variety of government, homeland security, enterprise and public safety vertical markets.

The OptimalCloud platform, supports multiple authentication methods, including push notifications via the proprietary Optimal Authenticator app, which works for Android, Windows, and iOS. Other authentication methods include FIDO2 devices, RADIUS, OTP and TOTP, SMS, and security questions. 

For policy management, the OptimalCloud allows the definition of MFA requirements based on organizational membership or on access to specific applications. Administrators can also implement adaptive MFA by combining dynamic and static policies such as user behavior, device, and location.

 “This 2022 ASTORS award validates Optimal IdM’s strategic vision for innovation with products such as the OptimalCloud,” said Mike Brengs, Managing Partner and CRO of Optimal IdM. He continued, “We are revolutionizing the IAM space that meets many of the unprecedented challenges facing public and private employers today.”

American Security Today’s panel of experts evaluated the OptimalCloud for its technical innovation, interoperability, specific impact within the category, the overall impact to the industry, relatability to other industry technologies, and application feasibility outside the industry.

More information about the OptimalCloud and the MFA offering can be found at www.TheOptimalCloud.com

About The OptimalCloud
The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. The OptimalCloud is currently integrated with more than 11,000 applications.

 About Optimal IdM
Optimal IdM is a global provider of innovative and affordable identity access management solutions. Optimal IdM partners with enterprise and small to mid-sized businesses to provide comprehensive and affordable IAM solutions that meet their specific security, usability, and scalability needs. Optimal IdM also offers its solutions as a managed service offering. Customers include Fortune 1000 companies from every industry as well as federal, state and local government agencies. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception.

 Visit www.optimalidm.com for more information.

# # #



  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.